1 / 30

Financial Fraud and the Internet

Financial Fraud and the Internet. Det. Missy Coyne Baltimore County Police Department. Goals. To define Social Networking and it’s dangers To be able to identify fraud related crimes and scams that occur on the Internet To discuss Identity Theft and credit card fraud

kinsey
Download Presentation

Financial Fraud and the Internet

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Financial Fraud and the Internet Det. Missy Coyne Baltimore County Police Department

  2. Goals • To define Social Networking and it’s dangers • To be able to identify fraud related crimes and scams that occur on the Internet • To discuss Identity Theft and credit card fraud • To understand the difference between a “breach” and a “skim” • To discuss safe practices while using the Internet

  3. Definition Cybercrime is criminal activity done using computers and the Internet. This includes anything from downloading illegal music files to stealing millions of dollars from online bank accounts. Cybercrime also includes non-monetary offenses, such as creating and distributing viruses on other computers or posting confidential business information on the Internet. Definition obtained from www.techterms.com

  4. How do people access the Internet? • Internet Service Provider (ISP) • Cell phone • Tablets • Gaming System • Playstation 3 • Xbox 360 • Wii

  5. What do we get from the Internet? • Social networking sites • Email • On line chatting • On line gaming • Access to Financial Institutions • Access to Retail websites

  6. What is a “social network site”? • Social Network Sites are defined as “web-based services that allow individuals to (1) construct a public or semi-private profile within a bounded system, (2) articulate a list of other users with whom they share a connection, and (3) view and traverse their list of connections and those made by others within the system. The nature and nomenclature of these connections may vary from site to site”. 2007 Journal of Computer-Mediated Communication, 13(1), article 11.

  7. Examples of Social Networking Sites (SNS) • Myspace.com • Facebook • Match.com • Plenty of Fish • Free Site • Christian Mingle

  8. Facebook • Harvard ONLY SNS in early 2004 • Started supporting other colleges but they had to have university email addresses associated to those institutions • 2005, opened up to high school students, professionals inside corporate networks, and eventually, everyone.

  9. Dangers of SNS’s • Cyber stalking • Cyber bullying/ threats • Disclosure of private information • ID Theft • Take over or create pages

  10. Dating Web Site Dangers • After communicating for a period of time, the individual indicates they have a friend in another country that needs assistance and convinces the subject to send money to the person in the other country. • Similar scenario but ask the individual to send packages to them because they can’t receive the packages where they are.

  11. Cyber Stalking • Cyberstalking is the use of the Internet to “Stalk” someone. • "Stalking is a form of mental assault, in which the perpetrator repeatedly, unwantedly, and disruptively breaks into the life-world of the victim, with whom he has no relationship (or no longer has), with motives that are directly or indirectly traceable to the affective sphere. Moreover, the separated acts that make up the intrusion cannot by themselves cause the mental abuse, but do taken together (cumulative effect). Wikipedia

  12. Cyber bullying • Cyberbullyingis being cruel to others by sending orposting harmful material or engaging in other formsof social aggression using the Internet or other digitaltechnologies. • Center for Safe and Responsible Internet Use

  13. Lack of Laws for Adult based crimes

  14. Giving your personal information to individuals you haven’t physically met

  15. Fraud Related Computer Crimes • Phishing

  16. Phishing • Emails or phone calls that appear to be from legitimate companies asking for your information.

  17. Fraud Related Scams • Jobs • Reshipping • Craigs List • Room mates • Items • Vacation rentals • Other Fraud Scams

  18. RESHIPPING SCAM • Victims are usually contacted by instant message (IM) or online personal ads • Suspects are from African Country (Nigeria or Ghana). They start “chatting” and a personal relationship develops • Eventually they will ask victim to do favors such as accept deliveries and reship them to other countries

  19. FOREIGN LOTTERY SCAMS It’s illegal to play foreign lotteries in the United States A Federal Statute prohibits mailing lottery tickets, advertisements or payments to purchase tickets in a foreign lottery

  20. Publishers Clearing House They do NOT call you on the PHONE

  21. Fraud Related Computer Crimes • Identity Theft and Credit Card Fraud • Take over account fraud • Wire Fraud • Use of Credit card numbers

  22. Identity Theft • Begins when criminals obtain personal identifiers of individuals with good credit by: • Recruiting individuals who have access to other people’s personal information in the course of their employment – Collusive Employees • Stealing documents from businesses that contain personal information - Medical records, loan applications, etc.

  23. Types of Access Device Fraud • Skimming – Theft of account numbers and track data • Counterfeit Credit Cards • Altered Credit Cards (re-embossing) • White Plastic • Lost/Stolen/Non-Received Issued (NRI) • Misuse of Account Numbers

  24. Skimming “The replication of electronically transmitted full track data to allow or enable valid authorization to occur.”

  25. Credit Card Number & Name What are they stealing? Information embedded within Information embedded within Credit Card Tracks Credit Card Tracks CVC & CVV Discretionary (may include home address or other identifiers) Skimmers Capture all 3 Tracks of Information

  26. Breaches Intentional vs. Unintentional Sam’s Club vs Target Breaches vs skimming Location of transactions

  27. Internet Fraud Prevention • Don’t answer or open emails from unknown sources • Don’t provide your personal information to someone you don’t know • If it sounds too good to be true…it is • Look for secure websites….https:// when conducting on line purchases • Check your financial statements regularly

  28. Internet Fraud Prevention • Use Anti virus and firewall protection to protect your system • Don’t download software from unknown sites • Use secure passwords for websites • Letters and numbers (characters if permitted) • Change often and don’t duplicate

  29. Questions?

More Related